*NEWS*CYBER CROOKS BREAK INTO ONLINE ACCT

Toner News Mobile Forums Latest Industry News *NEWS*CYBER CROOKS BREAK INTO ONLINE ACCT

Date: Friday November 11, 2005 10:28:00 am
Viewing 1 post (of 1 total)
  • Author
    Posts

  • Anonymous
    Inactive

    Cyber crooks break into online accounts with ease
    GASTONIA,
    N.C. – When he logged on to his Ameritrade account earlier this year,
    George Rodriguez caught a cybercrook in the act of cleaning out his
    retirement nest egg.

    He
    watched, horrified, as the intruder in quick succession dumped $60,000
    worth of shares in Disney, American Express, Starbucks and 11 other
    blue-chip stocks, then directed a deposit into the online account of a
    stranger in Austin.
    “My entire portfolio was being sold out right
    before my eyes,” recalls Rodriguez, 41, a commercial real estate broker
    who alerted Ameritrade in time to stop the trades.
    Rodriguez had
    just experienced a tech-savvy consumer’s worst nightmare. But it’s the
    reality of the digital world we live in: Everyone is now at risk of
    becoming the victim of an Internet-based crime – even folks who stay
    offline. And, once victimized, you can face more trouble than you might
    imagine.
    Many consumers and small-business owners naively believe
    online transactions are safe if they use a firewall, keep anti-virus
    software updated and follow security tips posted on banking websites.
    Not
    so, Internet security experts and federal regulators say. “What banks
    don’t tell you is how easy it is to bypass those protections, and how
    prolific the threat is, because then you wouldn’t do online banking,”
    says Peter Vogt, a board member of Information Systems Security
    Association, an international group of tech security professionals.
    Over
    the past two years, banks, credit card companies and credit agencies
    have made everything from changing a billing address to extending
    credit and transferring large sums easy to do online.
    That has
    created fresh opportunities for swindlers and hackers, say dozens of
    banking and Internet-security executives, analysts, consultants,
    researchers and regulators interviewed by USA TODAY over the past four
    months.
          Exploiting accounts         
    Federal regulators are
    cognizant of the biggest blind spot: To gain access to most online bank
    accounts, you need nothing more than a user name and a password.
    Bank
    of America told USA TODAY that it plans to require extra log-on steps
    for all Internet customers by early next year. It will become the first
    major U.S. bank to add another level of authentication, as banking and
    tech-security experts debate how to best balance convenience and
    security.
    The Federal Financial Institutions Examinations Council
    last month called on all banks to toughen log-on procedures by the end
    of 2006. But the council, a consortium of five federal banking
    agencies, stopped short of specifying how to do that.
    “No one knows what the right answer is yet,” says Unisys banking security consultant John Pironti.
    ‘They said it was safe’
    The
    case of small-businessman Joe Lopez, closely watched in banking and
    legal circles, has emerged as a microcosm of e-commerce at a crossroads.
    The
    bootstrap founder of Ahlo, a thriving Miami-based ink and toner
    cartridge wholesale business, Lopez says he opened a Bank of America
    online business account in October 2003 after being cajoled by bank
    representatives on more than 20 different visits to his local branch.
    “They said it was safe,” Lopez, 42, recalls from his office in a gritty
    industrial neighborhood.
    In April 2004, moments after logging on to
    his online account at work, Lopez spotted an entry revealing that
    someone had executed an electronic transfer of $90,348.65 to Parex Bank
    in Riga, Latvia. Lopez knew no one in Latvia. “I thought I was going to
    vomit,” he recalls.
    The next day, according to bank records, a
    mysterious figure named Yanson Arnold withdrew $20,000 in cash from
    Parex Bank, leaving $70,348.65 behind. Arnold has not been heard from
    since.
    Secret Service investigators later discovered someone had
    slipped a Trojan – a small bit of malicious code – past the firewall
    and anti-virus software Lopez assumed kept his computer protected. The
    Trojan, called Coreflood, had captured and transmitted Lopez’s user
    name and password to a data thief, who probably sold it to Arnold or
    his associates.
    Bank of America disavowed responsibility, prompting
    Lopez to sue the bank in federal court in Miami to get his money back.
    “We fully investigated his claims and determined that all of our
    internal protocols and security measures were in place,” says Shirley
    Norton, a Bank of America spokeswoman.
    In its defense, the bank has
    invoked an obscure section of the Uniform Commercial Code, state laws
    governing commercial contracts, which banks helped draft. It limits
    liability in delivering online services to businesses if certain
    safeguards are in place.
    Norton says the bank considers Lopez a
    business customer doing commercial transactions, not a consumer doing
    household banking. Consumers are protected by federal laws that limit
    their fraud losses in most cases to $50. They must report discrepancies
    promptly and generally be able to show wrongdoing.
    “It’s a bank’s way of saying, ‘It’s the customers’ fault,’ ” says Gail Hillebrand, a senior attorney at Consumers Union.
    Legal
    experts say BofA’s stance makes sense. It is refusing to expose itself
    to liability arising from the countless malicious programs that infest
    PCs used by small companies, over which the bank has no control. Such
    exposure could force financial institutions to curtail online services
    being pitched to small firms, a promising growth area.
    No trial date
    has been set for the case. If BofA prevails, it will reinforce the
    Uniform Commercial Code as a legal rampart financial institutions can
    use to fend off similar lawsuits. “Making Lopez whole could open BofA
    to settling lots of other breaches, and that adds up to a lot of
    money,” says Mark Budnitz, a law professor at Georgia State.
    Meanwhile,
    Lopez, now a First Bank of Miami customer, faxes wire-transfer requests
    to the bank using a form letter. He follows up with a phone call. “No
    more online transactions for me, man,” he says.
    Stealthy exploits
    While
    financial industry executives acknowledge the Internet’s security
    pitfalls, they say they have been mindful of minimizing risks to
    consumers and small businesses. Of the $1.3 trillion in transactions
    done with Visa credit cards in 2004, only 0.05%were fraudulent, the
    same Level as 2003, and down from 0.07%in 2002. Visa does not break out
    online transactions.
    “Online banking is safe and getting safer,” says Doug Johnson, senior policy analyst at the American Bankers Association.
    Indeed,
    consumer financial fraud has been around as long as checking accounts
    and credit cards, and banks already do plenty to stop fraud. But
    e-commerce has opened virgin criminal frontiers. “In the past,
    everything was much more traceable,” says Gartner banking analyst
    Avivah Litan. “Now you can open 10,000 (bogus) accounts in the time it
    used to take to open one, all in a faceless InternET
    More than half
    of Bank of America’s retail banking customers also bank online. A look
    at the top five online banks by estimated number of customers (in
    millions):
    Stopping mailbox thieves and check kiters in the physical
    world is one thing. But modeling the threat posed by crime groups using
    the Internet to commit fraud electronically, on a global scale, has
    proved to be much more complex.
    For one thing, electronic thievery
    is difficult to measure. When crooks get away with an online scam,
    banks often misclassify the pilfered funds as uncollectible debt. That
    masks the level of online fraud, says Litan, while “making it easier
    for the criminals to escape the law.”
    What’s more, there is little
    urgency for banks to measure cybercrime precisely. Online banking
    services are still in a nascent phase, representing less than $200
    billion of the trillions of dollars of transactions banks handle each
    year.
    Coreflood could have gotten on Lopez’s PC several different
    ways. It is one of many tried-and-true tools ID thieves use to harvest
    user names, passwords, Social Security numbers, account numbers and
    other personal data.
    Anti-virus, anti-spyware and firewall defenses
    offer limited protection, primarily blocking the known malicious
    programs relentlessly blasting across the Internet, seeking unprotected
    PCs.
    But elite identity data thieves have shifted to smaller-scale,
    more stealthy exploits, often aimed at compromising 1,000 or so PCs a
    day, says Joe Hartmann, director of anti-virus research at Trend Micro.
    Over time they can infect millions of machines but go completely
    undetected.
    Some specialist hackers focus on finding new ways to
    attach Trojans to free, downloadable music, pornography and gambling
    files found across the Internet. Others hide Trojans on popular
    websites or in e-mail attachments. Downloading a tainted file, visiting
    a contagious Web page or opening a viral attachment can load a Trojan.
    Meanwhile,
    phishing scammers seem to have endless creativity when it comes to
    crafting e-mail to trick even computer-savvy individuals into divulging
    sensitive account information at counterfeit websites. The best and
    brightest coders can make good money deploying “SQL Injection” attacks.
    These are aimed at tricking a Web page linked to a company database
    into giving up sensitive employee and customer data.
    Low-tech heists
    work, too. Larcenous company insiders can get paid top dollar to assist
    in pilfering directly from company databases. For his new book, The
    Insider, A True Story: Sometimes Security is About Keeping An Eye On
    Those We Trust Most, Dan Verton examined network traffic at 50 large
    companies and government agencies.
    In two days spent at each
    organization, he found 6,000 instances of names, Social Security
    numbers, credit card numbers, tax ID numbers, private health care
    information, payroll data and bank account information being
    transmitted, without authorization, to unknown locations on the
    Internet or to private e-mail accounts.
    Verton says his findings
    suggest similar breaches may be taking place at an epidemic level
    across e-commerce, with insiders diverting vast amounts of valuable
    data to criminal circles.
    In short, if our personal information
    resides in any database anywhere, it can become a target, even if you
    prefer to write checks and patronize bricks-and-mortar banks and stores.
    ‘This stuff happens’
    Apart
    from data thieves, another kind of crook specializes in converting the
    stolen ID data into goods and cash, using the Internet as a
    communications and distribution network.
          Surge in attacks         
    Phishing: 73 million adults say they’ve received at least 50 phishing e-mails in the last 12 months.
    Spyware: 80% of consumer PCs are infected with spyware.
    Blended attacks: 63% of large companies say their main security concern is the increasing complexity of cyberattacks.
    Corporate
    losses: 639 of 700 companies and government agencies surveyed lost $31
    million worth of proprietary data and spent $43 million to clean up
    computer viruses.
    Consumer risk: 13% of all Internet users have had
    a member of their household victimized by identity thieves, and 41% say
    they are buying less online due to security threats.
    Sources:
    Gartner Research, June 2005; Web root, 2005 State of Spyware report;
    Deloitte 2005 Global Security Survey; CSI/FBI 2005 Computer Crime and
    Security Survey; Conference Board Research Center, 2005.
    “The market
    is becoming more sophisticated,” says Jim Melnick, former analyst for
    the Defense Intelligence Agency, now director of threat intelligence at
    security firm iDefense. “There’s more differentiating of roles and
    services to streamline and accelerate cybercriminal activity.”
    The
    most widely cited measure of cybercrime activity comes from a
    2-year-old Federal Trade Commission consumer survey, the first of its
    kind, which placed the number of Americans victimized by identity
    thieves at 10 million in 2003, with consumers losing $5 billion and
    businesses $48 billion.
    The FTC plans to redo its identity theft
    survey early next year, and the results are expected to reinforce
    anecdotal evidence that cybercrime has intensified.
    George
    Rodriguez, the North Carolina commercial real estate broker, doesn’t
    need a government study to tell him the threat is increasing. When
    Rodriguez spotted a cybercrook attempting to transfer proceeds from his
    Ameritrade portfolio to a consumer account at Bank of America, he
    quickly called authorities to cut short the stock trades before they
    were settled.
    But the experience left him wondering what might have
    happened if he had been on vacation or simply not using his computer
    that day.
    A local detective identified the BofA account owner as Kevin Maguire, a 53-year-old corporate travel manager from Austin.
    Contacted
    by USA TODAY, Maguire said he “has no idea” what happened to his bank
    account. He says BofA informed him of the incident, but said little
    else. “They just told me this stuff happens,” Maguire says.
    Investigators
    say cyberthieves probably intended to use Maguire’s compromised account
    to launder Rodriguez’s cash. To misdirect authorities, thieves
    typically transfer funds a number of times culminating in a cash
    withdrawal.
    Dealing with the fallout of a cybercrime can be
    frustrating. Most banks espouse policies of making restitution to
    consumers who fall prey to online fraud, if the crime is reported
    within 60 days.
    But that is not uniform. Ameritrade, which declined
    comment to USA TODAY, told Rodriguez in a short letter that it would
    unravel the bogus stock trades “as a one-time courtesy to you. …
    Going forward, you are responsible for any transactions placed in your
    account.”
    “They treated me as if I screwed up,” Rodriguez says, looking at the letter, shaking his head

Viewing 1 post (of 1 total)
  • You must be logged in to reply to this topic.